How It Works. API
to Standalone =>Java Antidecompiler uses a new technology developed by BIS Guard & Co. and patented, which means that it has passed the patent examination.
This technology includes the Java byte code and resources encryption, custom
class and resource loading, and implementation of "detect and reject"
tactics for preventing interception and other
hacker attacks. Java Antidecompiler uses "keyless encryption".
It means that the encryption key is not hard-coded but calculated at
runtime and thus can't be extracted from the decompiled
code.
Copyright © 2024
BIS Guard & Co.
Read Me
User Guide
EULA
Modified Jun 20,
2024
The diagrams below show both the protection process and the workflow of the protected application as well as a few code snippets. Java Antidecompiler API work-flowsDiagram 1. Protection step by step The protection process consists of several simple steps: 1. Opening the source API jar file and any dependencies files, if they are present. The user will select these files at the beginning of the process wizard. 2. Validation of the original jar API for correctness. This is crucial, as the next step involves parsing, and we want to avoid unnecessary issues. Additionally, we will check for any hacking attempts in the source API, such as dumping, reflection, and so on. 3. The next step involves extracting the mockups of all classes included in the API. This is done using simple byte code manipulation and reflection. An example snippet for extracting method headers is provided below Diagram 2. Compilation or development time Diagram 3. Run-time of protected API
It should be noted that the snippet codes are simplified and can’t be used in real apps. Additional technological underpinnings of our algorithms can be found in our Apology blog and DZone I, DZone II pages. |